تحديات خصوصية وأمن بيانات المستفيدين في المكتبات الرقمية: مراجعة للإنتاج الفكري
DOI:
https://doi.org/10.70000/cj.2026.78.670الكلمات المفتاحية:
المكتبات الرقمية، خصوصية البيانات، أمن المعلومات، الذكاء الإصطناعي، مراجعة الإنتاج الفكريالملخص
تُعد المكتبات الرقمية ركيزة أساسية للبحث والتعلم في العصر الحديث، حيث وسعت التطورات التقنية نطاق وصولها العالمي. ومع ذلك، أدى هذا التوسع إلى زيادة جمع ومعالجة بيانات المستخدمين لتقديم تجارب مخصصة، مما أثار مخاوف حرجة بشأن الخصوصية والأمن. تسلط هذه الوثيقة الضوء على التوازن المعقد بين الاستفادة من البيانات لتحسين الخدمات وبين حمايتها من التهديدات المتزايدة. تشير النتائج إلى أن الهجمات السيبرانية، مثل برامج الفدية واختراقات البيانات، لم تعد مجرد احتمالات بل واقعاً واجهته مؤسسات كبرى مثل المكتبة البريطانية وأرشيف الإنترنت. يتطلب تأمين هذه البيانات نهجاً متعدد الأبعاد يشمل التدابير التقنية، والامتثال التنظيمي، مثل لائحة GDPR، وتبني "الخصوصية بالتصميم" كمعيار أساسي، خاصة مع دمج التقنيات الناشئة مثل الذكاء الاصطناعي وسلسلة الكتل (Blockchain).
المراجع
Aregbesola, A., & Nwaolise, E. L. (2023). Securing digital collections: Cyber security best practices for academic libraries in developing countries. Library Philosophy and Practice. https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=15048&context=libphilprac
Ascot London. (2024, October 15). Enhancing cyber resilience: Lessons from the British Library’s ransomware attack. https://ascot.london/enhancing-cyber-resilience-lessons-from-the-british-librarys-ransomware-attack
Ashikuzzaman, M. (2024, June 2). Types of data libraries can collect and analyse to enhance their services. Lisedu Network. https://www.lisedunetwork.com/types-of-data-libraries-can-collect-and-analyze-to-enhance-their-services/
Cetin, M. B. (2024). Evaluating the effects of digital privacy regulations on user trust (Master’s thesis). https://arxiv.org/pdf/2409.02614
Chancey, T. (2024, January 12). Big data privacy issues: Protect your data with advanced analytics and security. The Scarlett Group. https://www.scarlettgroup.com/big-data-privacy-concerns/
Computer Weekly. (2024, January 15). British Library cyber-attack explained: What you need to know. https://www.computerweekly.com/feature/British-Library-cyber-attack-explained-What-you-need-to-know
Cynomi. (n.d.). What is regulatory compliance? https://cynomi.com/learn/regulatory-compliance/
DomainTools. (2024, October 23). Rogue hackers and the Internet Archive breach: 31 million accounts exposed [Podcast]. Breaking Badness Podcast. https://www.domaintools.com/resources/podcasts/rogue-hackers-and-the-internet-archive-breach-31-million-accounts-exposed/
EC-Council University. (2025, May). Understanding data breaches: What you need to know. https://www.eccu.edu/blog/data-breaches-threats-and-consequences/
GeeksforGeeks. (2025, May 24). 7 privacy challenges in cloud computing. https://www.geeksforgeeks.org/privacy-challenges-in-cloud-computing/
Granados, A. (2024, November 25). AI and personal data: Balancing convenience and privacy risks. Velaro Blog. https://velaro.com/blog/the-privacy-paradox-of-ai-emerging-challenges-on-personal-data
Greengard, S. (2025, June 7). Internet of Things. Britannica. https://www.britannica.com/science/Internet-of-Things
Gunter, D. (2024, February 22). AI challenges for librarians. Research Information. https://www.researchinformation.info/analysis-opinion/ai-challenges-librarians/
Hanif et al. (2025). Blockchain technology in libraries: Ensuring data security and transparency. Journal of Applied Linguistics and TESOL, 8(1). https://jalt.com.pk/index.php/jalt/article/view/423
Harper, M., & Oltmann, S. M. (2017). Big data’s impact on privacy for librarians and information professionals. Bulletin of the Association for Information Science and Technology,43(4), 19–23. https://doi.org/10.1002/bul2.2017.1720430406
Heckel, J. (2023, December 7). Study shows challenges to protecting privacy of library users. University of Illinois News Bureau. https://news.illinois.edu/study-shows-challenges-to-protecting-privacy-of-library-users/
Help Net Security. (2024, October 21). The Internet Archive breach continues. https://www.helpnetsecurity.com/2024/10/21/internet-archive-breach-continues/
Indraji, C., & Satishkumar, N. (2025). Application of cloud computing in libraries: Prospects and challenges. International Journal of Novel Research and Development, 10(2), b315–b322. http://eprints.rclis.org/46434/1/IJNRD2502143.ocr.pdf
Information and Privacy Commissioner of Ontario. (2025, March 24). Toronto Public Library cyberattack: A wake-up call for stronger security. https://www.ipc.on.ca/en/cases-of-note/toronto-public-library-cyberattack
Institute of Electrical and Electronics Engineers. (2025a). Emerging data privacy laws and regulations around the world. https://digitalprivacy.ieee.org/publications/topics/emerging-data-privacy-laws-and-regulations-around-the-world/
Institute of Electrical and Electronics Engineers. (2025b). Understanding privacy in the digital age. https://digitalprivacy.ieee.org/publications/topics/understanding-privacy-in-the-digital-age/
International Federation of Library Associations and Institutions. (2015, August 15). Statement on privacy in the library environment. https://www.ifla.org/publications/ifla-statement-on-privacy-in-the-library-environment/
Investopedia Team. (2022, September 30). Cloud security: Definition, how cloud computing works, and safety. Investopedia. https://www.investopedia.com/terms/c/cloud-security.asp
Işık, Ö. (2024, September 30). Full transparency: 10 lessons from the cyber-attack on the British Library. IMD. https://www.imd.org/ibyimd/technology/full-transparency-10-lessons-from-the-cyber-attack-on-the-british-library/
ISTARI. (2024, July). Learning lessons from the cyber-attack. https://istari-global.com/insights/spotlight/learning-lessons-from-the-cyber-attack/
jrose. (2024, October 31). Unwelcome AI: Examining the negative impacts on libraries. LibLime Blog. https://liblime.com/2024/10/31/unwelcome-ai-examining-the-negative-impacts-on-libraries/
Kadali, S., & Chary, K. D. (2017). Key issues and challenges in cloud computing for library services. IOSR Journal of Engineering, 7(12), 80–82. https://doi.org/10.9790/9622-0712038082
Kahle, B. (2024a, October 18). Internet Archive services update: 2024-10-17. Internet Archive Blogs. https://blog.archive.org/2024/page/4/
Kahle, B. (2024b, November 14). Learning from cyber-attacks. Internet Archive Blogs. https://blog.archive.org/tag/ddos/
Kahn, M. (2025, February 27). Cloud computing in libraries: Revolutionizing the way we store and access knowledge. MK Library. https://www.mklibrary.com/cloud-computing-in-libraries-revolutionizing-the-way-we-store-and-access-knowledge/
Kan, M. (2024, October 11). After breach, Internet Archive expects to return within “days, not weeks.” PCMag. https://www.pcmag.com/news/after-breach-internet-archive-expects-to-return-within-days-not-weeks
Kornfeind, M. (2022). Public libraries and information privacy policies: A case of the Naperville Public Library and privacy trends in the LIS profession. World Libraries, 26(2). https://worldlibraries.dom.edu/index.php/worldlib/article/view/595
Kumar, B. T. S., & Usha, S. S. (2024). IoT-based services in digital libraries: Innovations, benefits and concerns. Proceedings of the International Conference on Emerging Trends in Information Technology (March 15–16, 2024, Bengaluru, India). Library Philosophy and Practice. https://digitalcommons.unl.edu/libphilprac/1479
Magsi, I., Shaheen, N., Channar, W. A., Ali, M., Lakho, Z., Ahmed, A. (2025). Cybersecurity challenges in digital libraries. Review Journal of Social Psychology and Social Works, 3(1), 344–350. https://rjspsw.com/pdf/v3/i1/11.pdf
Masinde, J., Mugambi, F., & Muthee, D. W. (2025). Big data and personal information privacy in developing countries: Insights from Kenya. Frontiers in Big Data, 8, 1532362. https://doi.org/10.3389/fdata.2025.1532362
Matonkar, P. V. (2024). Library security in the digital age: Cyber threats and solutions. In The Knowledge Nexus. Creative Book Publisher. https://www.researchgate.net/publication/385092279_Library_Security_in_the_Digital_Age_Cyber_Threats_and_Solutions
Microsoft Azure. (2025). What is cloud computing? https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-cloud-computing/
Mullsjafari, S., & Bechkoum, K. (2023). Blockchain technology and related security risks: Toward a seven-layer perspective and taxonomy. Sustainability, 15(18), 13401. https://doi.org/10.3390/su151813401
Narendra, A. P., Gunawan, L. S., & Setiawan, A. S. A. (2024). Artificial intelligence implementation in library information systems: Current trends and future studies. Vietnam Journal of Computer Science, 1(25). https://doi.org/10.1142/S2196888824300023
Noh, Y. (2017). A critical literature analysis of library and user privacy. International Journal of Knowledge Content Development & Technology, 7(2), 53–83. https://doi.org/10.22744/IKCDT.2017.7.2.053
Office of the Victorian Information Commissioner. (n.d.). Internet of Things and privacy – Issues and challenges. https://ovic.vic.gov.au/privacy/resources-for-organisations/internet-of-things-and-privacy-issues-and-challenges/
Perry, Y. (2019, September 17). Data compliance for regulations around the world. NetApp Blog. https://www.netapp.com/blog/data-compliance-regulations-hipaa-gdpr-and-pci-dss/
Porsche, L., Suchá, L. Z., & Martinek, J. (2022). The potential of Google Analytics for tracking reading behavior in web books. Digital Library Perspectives, 38(4). https://doi.org/10.1108/dlp-03-2022-0021
Prasanna, R., & Yogendra, S. (2023). The role of artificial intelligence in enhancing digital library services. Journal of Emerging Technologies and Innovative Research, 10(12), f712–f723. https://www.researchgate.net/publication/390089610_The_Role_of_Artificial_Intelligence_in_Enhancing_Digital_Library_Services
PressReader Team. (2024, November 12). Enhancing patron and staff experience: The Internet of Things in libraries. https://blog.pressreader.com/libraries-institutions/enhancing-patron-and-staff-experience-the-internet-of-things-in-libraries
PressReader. (2024, July 17). Public libraries and cybersecurity: Keeping patrons' data safe. https://blog.pressreader.com/libraries-institutions/public-libraries-and-cybersecurity-keeping-patrons-data-safe
Rao, M. H., & Prasad, G. S. (2025). Enhancing security and privacy in digital libraries using blockchain technology. In Proceedings of the 7th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2025) (pp. 82–90). Atlantis Press. https://doi.org/10.2991/978-94-6463-712-0_9
Saha, R. (2024). Data privacy and cybersecurity in digital library perspective: Safeguarding user information. International Journal of Scientific Research in Engineering and Management, 8(4). https://doi.org/10.55041/IJSREM30761
SAS. (n.d.). Big data analytics: What it is and why it matters. https://www.sas.com/en_us/insights/analytics/big-data-analytics.html
Singh, U., & Chaudhari, A. M. (2022). Evaluating strategies for improving user privacy in digital libraries. International Journal of Food and Nutritional Sciences, 11(13),49–55 https://www.ijfans.org/issue-content/evaluating-strategies-for-improving-user-privacy-in-digital-libraries-13080
Stryker, C., & Kavlakoglu, E. (2024, August 9). What is artificial intelligence (AI)? IBM. https://www.ibm.com/think/topics/artificial-intelligence
Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT privacy and security: Challenges and solutions. Applied Sciences, 10(12),4102. https://doi.org/10.3390/app10124102
The British Library. (2024, March 8). British Library cyber review. https://cdn.sanity.io/files/v5dwkion/production/99206a2d1e9f07b35712b78f7d75fbb09560c08d.pdf
Timonera, K. (2024, November 27). Understanding AI privacy: Key challenges and solutions. eWeek. https://www.eweek.com/artificial-intelligence/ai-privacy-issues/
Toronto Newswire. (2024, February 12). City taking action to prevent cyber attacks that targeted libraries, hospitals, and zoo. https://torontonewswire.com/the-city-taking-action-to-prevent-cyber-attacks-that-has-rocked-our-libraries-and-zoo/
Toronto Public Library. (2024). Cybersecurity response and business continuity. https://www.urbanlibraries.org/innovations/cybersecurity-response-and-business-continuity
TrustCloud Community. (2025, April 2). Data privacy in 2025: What lies ahead? Trends and predictions. https://community.trustcloud.ai/article/data-privacy-in-2025-what-lies-ahead-trends-and-predictions/
Usman, M., & Ullah, A. (2024). Application of blockchain technology in digital libraries. In Proceedings of the International Conference on Advanced Technologies in Computing and Systems (ATICS 2024). AvePubs. https://avepubs.com/uploads/articles/171633893072904.%20ATICS-09-2024.pdf
Wang, J. (n.d.). Usage statistics. SPARC Open. https://sparcopen.org/our-work/negotiation-resources/data-analysis/usage-statistics/
Warren, T. (2024, October 14). The Internet Archive is back as a read-only service after cyberattacks. The Verge. https://www.theverge.com/2024/10/14/24269741/internet-archive-online-read-only-data-breach-outage
Xu, H., & Zhang, N. (2023). Privacy implications of blockchain systems: A data management perspective. Organizational Cybersecurity Journal: Practice, Process, and People. https://doi.org/10.1108/ocj-01-2023-0003
Yadav, P. (2024). Cloud computing in university libraries: Transforming access, management, and service delivery. International Research Journal of Engineering and Technology, 11(9), 649–654. https://www.irjet.net/archives/V11/i9/IRJET-V11I994.pdf
Zgzsur. (2024, November 10). What I learned from the Internet Archive hack and its aftermath: Personal reflections. https://wp.catedu.es/zgzsur/what-i-learned-from-the-internet-archive-hack-and-its-aftermath/
التنزيلات
منشور
كيفية الاقتباس
إصدار
القسم
الرخصة
الحقوق الفكرية (c) 2026 Omar Hassan Abdelrahman

هذا العمل مرخص بموجب Creative Commons Attribution 4.0 International License.








